cisco.com/en/US/products/hw/contnetw/ps4162/>
-----------
Roland Dobbins // <http://www.arbornetworks.com>
Sorry, sometimes I mistake your existential crises for technical
insights.
-- xkcd #625
forms also have the option to ignore, rather than drop.
---
Roland Dobbins // <http://www.arbornetworks.com>
Sorry, sometimes I mistake your existential crises for technical
insights.
-- xkcd #625
e domains for botnet C&C. IaaS abused to
launch DDoS won't be far behind.
---
Roland Dobbins // <http://www.arbornetworks.com>
Sorry, sometimes I mistake your existential crises for technical
insights.
-- xkcd #625
cs, of
course).
I'm also saying that threats to availability aren't something one can
always assume one will be able to handle alone; engaging with the
larger opsec community is key.
-----------
Roland Dobbins // <http
highly dependent upon an accurate time-hack,
as well.
---
Roland Dobbins <[EMAIL PROTECTED]> // +852.9133.2844 mobile
History is a great teacher, but it also lies with impunity.
-- John Robb
hardware-based edge platform, be sure to first
investigate all the particulars of its uRPF implementation so as to
ensure that you can use it for S/RTBH, and if at all possible, test it
before buying.
---
Roland Dobbins
ware-based platform is required to deal with high pps
rates (the Cisco equivalent is the ASR1000; I'm not familiar with
boxes from other vendors, but I'm pretty sure there are others in this
same class).
------
ss complex, et. al.
-------
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
the back-end is monolithic - and
it's more nearly a complete solution, with more options, granularity,
and safeguards available, than one based upon routing alone.
-------
Roland Dobbins // +852.9133.2844 mobile
All beh
urces, even though it isn't nearly as entertaining.
-------
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
e: Entertainment has (should have?) nothing to do with it.
Implementing BCPs is drudgery; because of this, it often receives
short shrift.
-----------
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
oss this happy circumstance in any organization who've asked me
about this kind testing, FWIW.
---
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
a lab
setup which reflects production for many reasons having nothing to do
with security).
---
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
eezing the design and initiating deployment.
-------
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
This seems to be a relatively rare attitude, unfortunately.
-------
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
commercial tools, which've been available for many
years.
And again, it comes back to understanding the performance envelope of
one's equipment, even without simulation.
-------
Roland Dobbins // +852.9133.2844 mobil
7;t
been implemented, it makes little sense to expend scarce resources
testing when those resources could be better-employed hardening and
increasing the resiliency and robustness of said network/system.
-------
Rola
)?
Did you have to pay a termination fee to get out of the arrangement?
---
Roland Dobbins // +852.9133.2844 mobile
All behavior is economic in motivation and/or consequence.
On Feb 22, 2009, at 2:28 PM, neal rauhauser wrote:
Does anyone have the full story on this?
<http://www.merit.edu/mail.archives/nanog/1997-04/msg00444.html>
---
Roland Dobbins // +852.9133.2844 mobile
Some thin
is:
<http://www.unixwiz.net/techtips/iguide-kaminsky-dns-vuln.html>
-------
Roland Dobbins // +852.9133.2844 mobile
Some things are just too precious to entrust to computers.
-- Seth Hanford
tacks.
---
Roland Dobbins // +852.9133.2844 mobile
Some things are just too precious to entrust to computers.
-- Seth Hanford
On Mar 2, 2009, at 9:10 AM, Roland Dobbins wrote:
With regards to DDoS mitigation, it's sometimes necessary to go
above layers-3/-4 in the event of layer-7-targeted attacks.
In fact, it's sometimes important to have the ability to parse packet
payloads and/or interact with traff
th the chosen policy-enforcement regime.
-------
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that got small.
-- Jason Scott
d concerns.
-------
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that got small.
-- Jason Scott
should be
deployed to protect the GGSN, et. al.
-------
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that got small.
-- Jason Scott
cture, stateless ACLs in hardware will work quite well.
---
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that got small.
-- Jason Scott
or so.
---
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that got small.
-- Jason Scott
d* specific complaints, did you not?
;>
-----------
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that got small.
-- Jason Scott
ll as implementing layer-3 anti-
spoofing on a per-switchport basis (i.e., BCP38 on a per-switchport
basis)?
---
Roland Dobbins // +852.9133.2844 mobile
Our dreams are still big; it's just the future that
would recommend taking a look at
NetFlow and starting with an open-source tool like nfsen/nfdump.
---
Roland Dobbins <[EMAIL PROTECTED]> // 408.527.6376 voice
I don't sound like nobody.
Interesting Microsoft Research piece on macro-scale user behaviors:
<http://research.microsoft.com/~horvitz/leskovec_horvitz_www2008.pdf>
---
Roland Dobbins <[EMAIL PROTECTED]> // +66.83.266.6344 mobile
eting (after acceptance by the Program Committee, which acts as a
gate), and then the NANOG folks post the documents along with any
slides and the VoDs of their presentations, in the usual fashion?
-----------
Roland
ional
information which folks have both the time and inclination to write
up, but which they don't due to the perceived lack of an appropriate
review/publication mechanism utilized by their intended audience?
-----------
d out.
---
Roland Dobbins <[EMAIL PROTECTED]> // +66.83.266.6344 mobile
History is a great teacher, but it also lies with impunity.
-- John Robb
amount large-scale enterprise computing (like banking,
pharma, government, and so forth) will take place.
I foresee interesting times ahead.
-------
Roland Dobbins <[EMAIL PROTECTED]> // +66.83.266.6344 mobile
His
can also
export NetFlow telemetry based upon the captured traffic. Arbor,
Narus, and Lancope have similar NetFlow-via-packet-capture capabilities.
---
Roland Dobbins <[EMAIL PROTECTED]> // +66.83.266.6344 mobile
H
On 28 Aug 2015, at 6:29, William Cooper wrote:
> A10, brocade, etc
dnsdist, as well.
---
Roland Dobbins
401 - 437 of 437 matches
Mail list logo